Issues [Year wise]

Year Wise :

Paper Title : cloud
Authors : sas, sass, ss
Affiliations :
Abstract :


DOI Link :

sas,sass,ss."cloud". International Journal of Computer Engineering In Research Trends (IJCRT) ,ISSN:2349-7084 ,Vol.6, Issue 01,pp.216-222, January - 2019, URL :xZxX,

Currently there are no Refbacks


Paper Title : Optimized control of Induction Heating System
Authors : Mrs. Asawari Dudwadkar , Dr. (Mrs.) Sayle Gha,
Affiliations : JJT University, Rajasthan, Asst. Prof., VESIT,Mumbai, India
Abstract :


In this paper a simple power and frequency control scheme is proposed for high power/high frequency Induction heating for Typical Heavy Industrial Applications like Induction Welding & Annealing which require operating on 100 kW / 100 kHz. The Proposed PI controller controls the load parameter values of R and L and thereby controls the resonance frequency of the whole model. The control scheme has the advantages of not only wide power regulation range but also ease of control output power. Also, it can achieve the stable and efficient Zero-Voltage-Switching in whole load range. The proposed method is described in detail and its validity is verified through simulink model. The model achieves proper power control for load ranging from 80 kW to 100kw.
DOI Link : NA

Induction heating, power control, PI controller

Mrs. Asawari Dudwadkar , Dr. (Mrs.) Sayle Gharge, “Optimized control of Induction Heating System”, International Journal Of Computer Engineering In Research Trends, 4(1):67-71, January-2017. [InnoSpace-2017:Special Edition]

[1] N. Mohan, T.M.Undeland, W.P.Robbins, “Power Electronic-Converters, Applications and Design", Second edition, John Wiley & Sons Inc., 1995.

[2]   O. Lucía, O. Jiménez, L. A. Barragán, I. Urriza, J. M
Burdío and D. Navarro, "System-on-programmable-           chip-based versatile modulation architecture applied to domestic induction heating," Industrial electronics, 2009. IECON '09. 35th Annual Conference of IEEE, Porto, 2009, pp. 2880-2885

[3] N. S. Bayindir, O. Kukrer and M. Yakup, "DSP-based PLL-controlled 50-100 kHz 20 kW high-frequency induction heating system for surface hardening and  welding applications," in IEE Proceedings – Electric Power Applications, vol. 150, no. 3, pp. 365-371,May 2003.

[4] J. Martis and P. Vorel, "Apparatus for induction heating 2.5 kW using a series resonant circuit," Mechatronics - Mechatronika (ME), 2014 16th International Conference on, Brno, 2014, pp. 130-135.

[5] T. Mishima, C. Takami and M. Nakaoka, "A New          Current Phasor-Controlled ZVS Twin Half-Bridge High-Frequency Resonant Inverter for Induction  Heating," in IEEE Transactions on Industrial Electronics, vol. 61, no. 5, pp. 2531-2545,May2014.

[6]   A. Amrhein and J. S. J. Lai, "A transformer-coupled,          Series-resonant topology for the induction heating of          aluminum cookware," 2015 9th International          Conference on Power Electronics and ECCE Asia          (ICPE-ECCE Asia), Seoul, 2015, pp. 1234-1239.

[7]   B. Saha and R. Y. Kim, "High Power Density Series          Resonant Inverter Using an Auxiliary Switched           Capacitor Cell for Induction Heating Applications,” In IEEE Transactions on Power Electronics, vol. 29   No. 4, pp. 1909-1918,April2014.

 [8] V. Esteveet al., "Improving the Reliability of             Series Resonant Inverters for Induction Heating             Applications," in IEEE Transactions on Industrial             Electronics, vol. 61, no. 5, pp. 2564-2572, May 2014. 

There are currently no refbacks

Paper Title : Bike Rider’s Safety Measures Using Helmet as a Key
Authors : Sanjeev Sahu, Lokesh Yadav, K Diwakar, Vibhor William
Affiliations : Mechatronics Engineering Department Chhatrapati Shivaji Institute of Technology Durg-491001, Chhattisgarh, India
Abstract :


Background/Objectives: The basic idea of the project is to make the helmet so smart that without wearing it the driver won’t be able to start the bike, so that it can ensure the safety of the riders. The main purpose of the project is to encourage wearing helmet. Method: The system design will be such that without wearing the helmet the rider cannot start two wheelers. The helmet will be connected to vehicle key ignition systems which will be electronically controlled. The smart helmet will be having micro switches fitted inside it, which will act as our switch for on/off ignition. It consist of a RF transmitter and an RF receiver system, the bike will not get started without wearing helmet by the driver, as the rider wear helmet an RF signals radiate from the transmitter and once these RF signals get sensed by the receiver placed in the ignition switch on the bike, bike will get started. Findings: People prefer motorcycles over the car as it is much cheaper to run, easier to repair, easier to park and flexible in traffic. In India more than 37 million people are using two wheelers. Since usage is high accident percentage of two wheelers are also high compared to four wheelers. Motorcycles have a higher rate of fatal accidents than trucks and buses. According to Ministry of Road Transport and Highways, Government of India there are around 1,44,391 bike accidents occurred in 2015 due to which 1,35,343 were injured and 36,803 were killed. Fatal injuries to the brain are an important reason behind deaths due to the road accidents. Therefore, a person riding a two wheeler must wear a helmet in order to protect his skull. Studies show that usage of helmet can save accident death by 30 to 40 percent. The risk of death is 2.5 times more among riders not wearing a helmet compared with those wearing a helmet. Riders wearing a helmet have a greater probability of survival during an accident. This project aims for accident avoidance, safety and security of bike riders. Applications: This can be used to minimize the accidents and casualties during riding can be used in broadcasting a message among the youth about the road safety and also a number of cases of violating traffic rules can be reduced.
DOI Link : NA

Smart Helmet, RF Module, Encoder/Decoder IC, Bike Authentication, Micro Switches, Keyless Bike, Relay Operation, Motor Driver IC, Bike Theft Prevention.

Sanjeev Sahu, Lokesh Yadav, K Diwakar, Vibhor William, “Bike Rider’s Safety Measures Using Helmet as a Key”, International Journal Of Computer Engineering In Research Trends, 4(1):61-66, January-2017. [InnoSpace-2017:Special Edition]

1.	Annual Report on ‘Road Accidents in India – 2015’, Transport Research Wing, Ministry of Road Transport and Highways, Government of India, New Delhi.

2.	Status Report on ‘Road Safety in India – 2015’, Transportation Research & Injury Prevention Programme (TRIPP), Indian Institute of Technology, New Delhi.

3.	Nitin Agarwal, Anshul Kumar Singh, Pushpendra Pratap Singh, Rajesh Sahani, Smart Helmet, International Journal of Engg. & Technology (IRJET) Vol. 2 Issue 2 ISSN (Online): 2395‐0056 (Print): 2395-0072 (May 2015).

4.	Manjesh N, Prof. 	Sudarshan Raju C H, Safety measures for two wheelers by Smart Helmet, International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 National Conference on Developments, Advances & Trends in Engineering Sciences (NCDATES), 09th & 10th January 2015.

5.	Amitava Das, Priti Das, Soumitra Goswami, Smart Helmet For Indian Bike Riders, Eleventh IRF International Conference, ISBN: 978-93-84209-47-6, 17th August 2014, Chennai, India.

6.	Ravi Nandu and Kuldeep Singh, Smart Helmet For Two-Wheelers, Advances in Automobile Engineering, ISSN: 2167-7670, Vol. 3 Issue 2, Department of Automobile Engineering, SRM University, Kattankulathur, Chennai, India.

7.	Manasi Penta, Monali Jadhav and Priyanka Girme, Bike Rider’s Safety Using Helmet, International Journal of Electrical Electronic Engineering and Telecommunications (IJEETC) ISSN: 2319-2518, Vol. 4, No. 2, Department of Electronics and Telecommunication, Dr. D Y Patil Technical Campus, Charoli (BK), Pune, India. 

There are currently no refbacks

Paper Title : Link quality based Ant based Routing Algorithm (LARA) in MANETs
Authors : C.V.Anchugam, Dr.K.Thangadurai,
Affiliations : Link quality based Ant based Routing Algorithm (LARA) in MANETs
Abstract :


Recently a new method is developed to handle the problem of routing in ad hoc network and overcomes the shortcomings of the classical methods; these methods are based on swarm intelligence inspired from biological swarms, such as ants in order to solve some complex problems such as finding food or optimizing route to food in real insect swarms. One of the most known routing algorithms for MANETs, as described Ant based Routing Algorithm (ARA) suffers from some limitations within the pheromone computing since it has not taken the necessary consideration to the characteristics of MANETs such as mobility and the medium constraint. Therefore, in our proposed enhancement to ARA called Link quality based ARA (LARA), it can be included the link quality in route selection and probability computing which have considerably improved the network performance and the system lifetime.
DOI Link : NA

MANETs, LARA, Routing, Link quality, Swarm Intelligence, Cross-layer.

C.V.Anchugam, Dr.K.Thangadurai, “Link quality based Ant based Routing Algorithm (LARA) in MANETs”, International Journal Of Computer Engineering In Research Trends, 4(1):52-60, January-2017. [InnoSpace-2017:Special Edition]

[1].	Al Agha K., Pujolle G., Vivier G., “Reseaux de mobiles et reseaux sans fil“, 2nd edition, Eyrolles, 2005. 
[2].	Basagni S., Chlamtac I., Syrotiuk V. R., Woodward B. A., “A Distance Routing Effect Algorithm for Mobility (DREAM)”, In Proceedings ACM/IEEE Mobicom, pages 76-84, October 1998.   
[3].	Camp, T., Boleng, J., Williams, B., Wilcox, L., Navidi, W.,  “Performance comparison of two location based routing protocols for ad hoc networks”, INFOCOM 2002, Twenty-First Annual joint conference of the IEEE Computer and Communications Societies, Proceedings, IEEE, Volume. 3, 2002,  pp. 1678 –168. 
[4].	Clausen T., Jacquet P., Viennot L., “Comparative Study of Routing Protocols for Mobile Ad hoc Networks”, Med-Hoc-Net’02, Sardegna, Italy, September 2002. 

[5].	Daniel Camara, Antonio Alfredo F. Loureiro, “A Novel Routing Algorithm for Hoc Networks”, Baltzer Journal of Telecommunications Systems, 18:1-3, Kluwer Academic Publishers, 2001, pp. 85-100.    
[6].	DiCaro G., Dorigo M., “Ant Colonies for Adaptive Routing in Packet-Switched Communications Networks”, Proceedings PPSN V - Fifth International Conference on Parallel Problem Solving from Nature, Amsterdam, Holland, September 27-30, 1998, pp. 673-682.    
[7].	Gerharz M.L, De Waal C., Frank M., Martini P., “Link Stability in Mobile Wireless Ad Hoc Networks”, Proceedings of the 27th Annual IEEE Conference on Local Computer Networks (LCN), Tampa, Florida, November 2002.  
[8].	Gunes M., Sorges U., Bouazisi I., “ARA - the Ant Colony Based routing Algorithm for MANETs”, Proceedings ICPP Workshop on Ad hoc Networks, Vancouver, Canada, 2002, pp. 7985.  
[9].	Heusse M., Snyers D., Guérin S., Kuntz P., "Adaptive agent-driven routing and load balancing in communication network", Proceedings ANTS'98,First International Workshop on Ant Colony Optimization, Brussels, Belgium, October 15-16, 1998.   
[10].	Iwata A., Chiang C.-C., Pei G., Gerla M., Chen T.-W., "Scalable Routing Strategies for Ad Hoc Wireless Networks", IEEE Journal on Selected Areas in Communications, Special Issue on Ad-Hoc Networks, Aug. 1999, pp.1369-1379.   
[11].	Jacquet, Paul Muhlethaler, Amir Qayyum, Anis Laouiti, Laurent Viennot, Thomas Clausen, “Optimized Link State Routing Protocol”, Internet Draft, draft-ietf-manet-olsr-04.txt, work in progress, June 2001.   
[12].	Jagannathan Sarangapani, “Wireless Ad Hoc and Sensor Networks Protocols”, Performance, and Control”, Taylor & Francis Group, LLC, 2007. 
[13].	Jiang M., Li J., Tay Y. C., “Cluster Based Routing Protocol (CBRP)”, Functional Specification Internet Draft, draft-ietf-manet-cbrp.txt, work in progress, June 1999. 
[14].	Jinyang Li, John Janotti, Douglas S. J. De Coutu, David R. Karger, Robert Morris. “A Scalable Location Service for Geographic Ad Hoc Routing”, M.I.T. Laboratory for Computer Science.   
[15].	Johnson D., Maltz D., Y-C. Hu, Jetcheva J., “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks”, Internet Draft, draft-ietf-manet-dsr-09.txt, work in progress, April 2003. 
[16].	Ko Y.-B., V. N. H. “Location-Aided Routing in mobile Ad hoc networks”, In Proceeding ACM/IEEE Mobicom, October 1998, pp. 66-75. 
[17].	Mesut Gunes et. al, “ARA - the ant-colony based routing algorithm for MANETs”, In Stephan Olariu, Proceedings of the 2002 ICPP Workshop on Ad Hoc Networks (IWAHN 2002), IEEE Computer Society Press, August 2002, pp. 79-85. 
[18].	Navid Nikaein, Christian Bonnet, Neda Nikaein. “Hybrid Ad Hoc Routing Protocol – HARP”, proceeding of IST 2001: International Symposium on Telecommunications.  
[19].	Park V., Corson S., ”TORA (Temporally-Ordered Routing Algorithm routing protocol)”,  Internet Draft, draft-IETF-MANET-TORA-spec- 03.txt, work in progress, June 2001. 
[20].	Perkins C., Royer E., Das S., “Ad hoc On-demand Distance Vector (AODV) Routing”, Internet Draft, draft-ietf-manet-aodv-11.txt, work in progress, Aug 2002. 
[21].	Perkins C. E., Bhagwat P., “Highly Dynamic Destination-Sequenced Distance Vector (DSDV) for Mobile Computers”, Proceedings of the SIGCOMM 1994 Conference on Communications Architectures, Protocols and Applications, Aug 1994, pp 234-244.  
[22].	Siva Ram Nurthy C.,  Manoj B.S., “Ad hoc wireless networks Architectures and Protocols”, le Prentice Hall, 2004. 
[23].	Sridhar K. N., Lillykutty J., Rajeev S., “Performance Evaluation and Enhancement of Link Stability Based Routing for MANETs”, lst International Workshop on Mobile and Wireless Networking (MWN 2004), Montreal, Quebec, Canada, August 15, 2004.    
[24].	Tsu-Wei Chen, Mario Gerla, "Global State Routing: A New Routing Scheme for Ad hoc Wireless Networks", Proceedings IEEE ICC'98.   
[25].	White T., "Swarm intelligence and problem solving in telecommunications", Canadian Artificial Intelligence Magazine, Spring, 1997.    
[26].	White T., "Routing with swarm intelligence", Technical Report SCE-97-15, Systems and Computer Engineering Department, Carleton University, September, 1997.    
[27].	Zygmunt J. Haas, Marc R. Pearlman, Prince Samar, “The Bordercast Resolution Protocol (BRP)”, Internet Draft, draft- ietf-manet-zone-zrp-04.txt, work in progress, July 2002. 

There are currently no refbacks

Paper Title : A Comparative Study of Discovering Frequent Subgraphs – Approaches and Techniques
Authors : B.Senthilkumaran, Dr.K.Thangadurai,
Affiliations : P.G. and Research,Department of Computer Science, Government Arts College (Autonomous), Karur-05.
Abstract :


Graph mining is an important research vertical and recently the usage of graphs has become increasingly imperative in modeling problematic complex structures such as electrical circuits, chemical compounds, protein structures, bioinformatics, social networks, workflow diagrams, and XML documents. Plethora of graph mining algorithms has been developed and the primary objective of this paper is to present a detailed survey regarding the approaches and techniques employed to find the issues and complexities involved.
DOI Link : NA

Graph, Mining, complex structure, techniques, modelling

B.Senthilkumaran, Dr.K.Thangadurai, “A Comparative Study of Discovering Frequent Subgraphs – Approaches and Techniques”, International Journal Of Computer Engineering In Research Trends, 4(1):41-45, January-2017. [InnoSpace-2017:Special Edition]

1] Chen, M.S., Han,J.and Yu,P.S. 1996 Data mining – An overview from database perspective, IEEE Transaction on knowledge and data engineering 8 , 866-883
[2] Alm, E. and Arkin, A.P. 2003. Biological Networks, Current Opinion in Structural Biology 13(2), 193– 202.
[3] Nijssen, S. and Kok, J., Faster association rules for multiple relations. In IJCAI’01:  Seventeenth International Joint Conference on Artificial Intelligence, 2001, vol. 2, pp. 891–896.
[4] Chuntao Jiang, Frans Coenen and Michele Zito, A Survey of Frequent Sub-graph Mining Algorithms:The Knowledge Engineering Review, Vol. 00:0, 1–31.c 2004.
[5] A. Inokuchi, T.Washio, and H. Motoda. An apriori-based algorithm for mining frequent substructures from graph data. In PKDD’00.
[6] J. Huan, W.Wang, and J. Prins. Efficient mining of frequent subgraph in the presence of isomorphism. UNC computer science technique report TR03-021, 2003.  
[7] J. Huan, W. Wang, J. Prins, and J. Yang. Spin: Mining maximal frequent sub-graphs from graph databases. UNC Technical Report TR04-018, 2004.  
[8] M. Kuramochi and G. Karypis. Grew-a scalable frequent subgraph discovery algorithm. In ICDM, pages 439–442,2004.
[9] ZhaonianZou, Jianzhong Li, Hong Gao, and Shuo Zhang : Frequent Subgraph Patterns from Uncertain Graph Data. IEEE Transactions On Knowledge And Data Engineering, Vol. 22, No. 9, September 2010.
[10] L. T. Thomas, S. R. Valluri, and K. Karlapalem. Margin:Maximal frequent subgraph mining. Proc. 6th IEEE Int’l Conf. Data mining (ICDM ’06), pp. 1097-1101, 2006.
[11] Inokuchi, A., Washio, T., Nishimura, K. and Motoda, H. 2002. A Fast Algorithm for Mining Frequent Connected Subgraphs, Technical Report RT0448, IBM Research, Tokyo Research Laboratory, Japan.
[12] Huan, J., Wang, W. and Prins, J. 2003. Efficient Mining of Frequent Subgraph in the Presence of Isomorphism, In Proceedings of the 2003 International Conference on Data Mining, 549-552.

There are currently no refbacks

Paper Title : Detection and area calculation of brain tumour from MRI images using MATLAB
Authors : Suman Das, Nashra Nazim Siddiqui, Nehal Kriti and Surya Prakash Tamang
Affiliations : Sikkim Manipal Institute of Technology, Sikkim-737132, India
Abstract :


The main objective of our task is to recognize a tumour and its quantifications from a particular MRI scan of a brain image using digital image processing techniques. The motivation of our work is to provide an efficient algorithm for detecting the brain tumour and calculating its growth. This research describes the proposed strategy to detect & extraction of brain tumour from patient’s MRI scan images of the brain. This method incorporates with some noise removal functions, segmentation and morphological operations which are the basic concepts of image processing. Detection and extraction of tumour from MRI scan images of the brain is done by using MATLAB software.
DOI Link : NA

MRI, Brain Tumour, digital image processing, segmentation, morphology, MATLAB.

Suman Das, Nashra Nazim Siddiqui, Nehal Kriti, Surya Prakash Tamang, “Detection and area calculation of brain tumour from MRI images using MATLAB”, International Journal Of Computer Engineering In Research Trends, 4(1):37-40, January-2017. [InnoSpace-2017:Special Edition]

[1]	 Dou, W., Ruan, S., Chen, Y., Bloyet, D., and Constans, J. M. (2007), “A framework of fuzzy information fusion for segmentation of brain tumor tissues on MR images”, Image and Vision Computing, 25:164–171. 
[2]	 T.Logeswari and M.Karnan, “An Improved Implementation of Brain Tumor Detection Using Segmentation Based on Hierarchical Self Organizing Map”, International Journal of Computer Theory and Engineering, Vol. 2, No. 4, August, 2010,pp.1793-8201. 
[3]	 R. Rajeswari and P. Anandhakumar, “Segmentation and Identification of Brain Tumor MRI Image with Radix4 FFT Techniques”, European Journal of Scientific Research, Vol.52 No.1 (2011), pp.100-109.
[4]	 S.Murugavalli, V.Rajamani, “A high speed parallel fuzzy c-mean algorithm for brain tumor segmentation”, ”BIME Journal”, Vol no: 06, Issue(1), Dec.,2006.
[5]	 Oelze, M.L,Zachary, J.F. , O'Brien, W.D., Jr., Differentiation of tumor types in vivo by scatterer property estimates and parametric images using ultrasound backscatter , on page(s) :1014 - 1017 Vol.1, 5-8 Oct. 2003. 
[6]	 T. Logeswari and M. Karnan, An improved implementation of brain tumor detection using segmentation based on soft computing, Second International Conference on Communication Software and Networks, 2010. ICCSN‟10.Page(s): 147-151. 
[7]	Devos, A, Lukas, L.,Does the combination of magnetic resonance imaging and spectroscopic imaging improve the classification of brain tumours?? On Page(s): 407 – 410, Engineering in Medicine and Biology Society, 2004. IEMBS '04. 26th Annual International Conference of the IEEE, 1-5 Sept. 2004.
[8]	Mohammad Shajib Khadem, “MRI Brain image segmentation using graph cuts”, Master of Science Thesis in Communication Engineering, Department of Signals and Systems, Chalmers University Of Technology, Goteborg, Sweden, 2010. 

There are currently no refbacks

Paper Title : Design of a System to Import Common Information of an Applicant from a Centralized Database While Filling Online Recruitment Application Form
Authors : Govind Prasad Arya, Devendra Prasad,
Affiliations : Uttarakhand Technical University, Dehradun, Assistant Professor in Computer Science & Engineering Department, Shivalik College of Engineering, Dehradun, India
Abstract :


In the past recruitment application forms were filled on papers by the candidates and then the filled forms were sent to the recruitment organization through postal services. But in current scenario most of the recruitment organizations are providing the facility of filling application forms online to the candidates. The candidate fills various application forms on regular basis due to higher degree of unemployment. It takes quite long to fill an application form as so many information like name, father’s name, mother’s name, date of birth, gender, addresses, qualification details, work experience has to be filled by candidate every time while filling the application forms of each recruitment organization. Sometimes the candidate has to fill the same information multiple times due to improper internet connectivity. It is also difficult to fill an application form using mobile because of the complex application interface. The applicants who have good computer knowledge may be comfortable with the filling of such complex forms online but it is very tedious task for a candidate having little knowledge of computer. In this research paper we propose a system that will import the common information of an applicant from a centralized database while filling recruitment application forms of various organizations. It will minimize the overheads of filling online application form. The applicants will be able to fill application form by a single click on import button available on the GUI interface of an online application form. The applicants who have basic knowledge of computer system will also be able to fill their recruitment application forms using proposed system. Methods/Statistical analysis: We feel the problem personally while filling online recruitment application forms. Every time the candidates have to fill the same set of information which is time consuming. Findings: The common information of the candidates can be stored in a centralized database from which the candidate can import his/her data while filling online application forms. Improvements/Applications: We have proposed a system for filling of common information of candidates in online application form using a centralized database which contains common information of candidates. Using the system we can save our time by importing of common information from the centralized database
DOI Link : NA

Online Services, IT Professionals, Software Engineering, Online Application Form, Import Information, Centralized Database, Online Application form from centralized database.

Govind Prasad Arya, Devendra Prasad, “Design of a System to Import Common Information of an Applicant from a Centralized Database While Filling Online Recruitment Application Form ”, International Journal Of Computer Engineering In Research Trends, 4(1):30-32, January-2017. [InnoSpace-2017:Special Edition]


There are currently no refbacks

Paper Title : Felicitation of cloths for poor & needy people of villages in India
Authors : Govind Prasad Arya, Deepa Arya, Devendra Prasad
Affiliations : Uttarakhand Technical University, Dehradun, Assistant Professor in Computer Science & Engineering Department, Shivalik College of Engineering, Dehradun, India
Abstract :


The food, cloths & houses are the basic needs of pupils. There are a number of people in the world were those living below poverty lines. They have not proper food to eat, clothes to cover their bodies and homes to live. The government is felicitating the poor and needy peoples in a number of ways. Indian government provides different types of RASHAN CARDS to the Indian families on the basis of various annual incomes i.e BPL, APL, KhadyaSuraksha cards to avail them basic foods. There are so many schemes to provide economic help to construct their homes like Indira AawasYogana. Besides these there are various schemes to provide employments to the poor people for their survival. In this research paper, we proposed a scheme/system that felicitates the need of cloth, shoes to the poor & needy peoples of any age of uttarakhand in initial stage & for the other states in further stages. Using the proposed system we collect unused/old cloth, shoes from capable (rich) peoples as a donation and after processing (tailoring, washing & packaging) distribute them to the needy peoples on a regular basis. The system will specially concentrate on children, woman of villages & be free from caste, region, religion. Methods/Statistical analysis: We collect the data from the villages of uttarakhand. A lot of poor people are not capable to buy sufficient cloths for them or for their children. We find the same situation in the rural area of Uttar Pradesh (U.P) also. Findings: Although the government is facilitating food, houses to the poor & needy peoples still there is a need of cloths to the poor peoples of the India, especially in the rural area. The proposed scheme will contribute to the betterment of society. Improvements/Applications: We have proposed a scheme for felicitation of cloth. The model is shown in below mentioned figure.
DOI Link : NA

Felicitation of cloth, Poor & needy people, Problems in rural areas, Donation of cloth, Help for poor children, Social work.

Govind Prasad Arya, Deepa Arya, Devendra Prasad, “Felicitation of cloths for poor & needy people of villages in India”, International Journal Of Computer Engineering In Research Trends, 4(1):33-36, January-2017. [InnoSpace-2017:Special Edition]

[1], Wikipedia Portal.
[2], A government of India Portal.
byAdityaKalra, July, 2013.

There are currently no refbacks

Paper Title : New Method for Automatic Detection of Brain Tumor in Multimodal Brain Magnetic Resonance Images
Authors : Bhima K, Jagan A,
Affiliations : BVRIT Narsapur, Telangana, India.
Abstract :


Brain tumor is a one of the severe life altering disease and analysis of brain imaging is a most important task of visualizing the brain inner anatomical structures, analyzing brain tumor and surgical planning. Magnetic Resonance Imaging is used to diagnose a variety of diseases in the brain and it is found to be much superior to other techniques especially for brain tissues. The main advantage is that the soft tissue differentiation is extremely high for MRI. Image processing plays vital role in medical image analysis and Image segmentation is a most conman technique for analysis of MR imaging in many clinical applications. The parallel segmentation methods and techniques are expressed for the automatic detection of tumor in multimodal brain MR Image by existing state-of-art methods. However the specific results are not being projected and established in the similar researches. Hence, this proposed work tackles about automatic segmentation and detection of tumor in multimodal brain MR images. The main aim of the proposed work to achieve high segmentation accuracy and detection of tumor in the multimodal brain MR images and it was demonstrated in multimodal brain MR Images, viz. FLAIR MRI, T1 MRI, MRI and T2 MRI. The relative performance of the Proposed Method is demonstrated over existing methods using real brain MRI and open brain MRI data sets.
DOI Link : NA

Brain Tumor, Watershed Method, FCMC method, Proposed Method, Bilateral Filter, Brain MR Image.

Bhima K, Jagan A, “New Method for Automatic Detection of Brain Tumor in Multimodal Brain Magnetic Resonance Images ”, International Journal Of Computer Engineering In Research Trends, 4(1):26-29, January-2017. [InnoSpace-2017:Special Edition]

1)	N Van . Porz, "Multi-modalodal glioblastoma segmentation: Man versus machine", PLOS ONE, vol. 9, pp. e96873, 2014.
2)	S. Bauer, R. Wiest, L.-P. Nolte and M. Reyes, "A survey of MRI-based medical image analysis for brain tumor studies", Phys. Med. Biol., vol. 58, no. 13, pp. R97-R129, 2013.
3)	L. Weizman, "Automatic segmentation, internal classification, and follow-up of optic pathway gliomas in MRI", Med. Image Anal., vol. 16, no. 1, pp. 177-188, 2012.
4)	S. Ahmed, K. M. Iftekharuddin and A. Vossough, "Efficacy of texture, shape, and intensity feature fusion for posterior-fossa tumor segmentation in MRI", IEEE Trans. Inf. Technol. Biomed., vol. 15, no. 2, pp. 206-213, 2011.
5)	Jin Liu, Min Li, Jianxin Wang, Fangxiang Wu, Tianming Liu, and Yi Pan,A Survey of MRI-Based Brain Tumor Segmentation Methods, TSINGHUA SCIENCE AND TECHNOLOGY, Volume 19, Number 6, December 2014.
6)	J. B. T. M. Roerdink and A. Meijster, “The watershed transform: Definitions, lgorithms and parallelization strategies,” Fundamenta Informaticae,vol. 41, pp. 187–228, 2000.
7)	Gang Li , Improved watershed segmentation with optimal scale based on ordered dither halftone and mutual information, Page(s) 296 - 300, Computer Science and Information Technology (ICCSIT), 2010, 3rd IEEE International Conference, 9-11 July 2011.
8)	Benson. C. C, Deepa V, Lajish V. L and Kumar Rajamani, "Brain Tumor Segmentation from MR Brain Images using Improved Fuzzy c-Means Clustering and Watershed Algorithm",  Intl. Conference on Advances in Computing, Communications and Informatics (ICACCI), Sept. 21-24, 2016, Jaipur, India.
9)	L´aszl´o Szil´agyi,L´aszl´o Lefkovits and Bal´azs Beny´o, "Automatic Brain Tumor Segmentation in Multispectral MRI Volumes Using a Fuzzy c-Means Cascade Algorithm",  12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD),2015.
10)	G.-C. Lin, W.-J. Wang, C.-C. Kang and C.-M. Wang, Multispectral mr images segmentation based on fuzzy knowledge and modified seeded region growing, Magnetic Resonance Imaging, vol. 30, no. 2, pp. 230-246, 2012.
11)	NageswaraReddy P, C.P.V.N.J.Mohan Rao, Ch.Satyanarayana, Optimal Segmentation Framework for Detection of Brain Anomalies, I.J. Engineering and Manufacturing, 2016, 6, 26-37.

There are currently no refbacks

Paper Title : A Study on Online Chatting and Blogging among Teens Age in Southwest Part of Nigeria and Its Impact: A Digital Dividend
Authors : Oyebola Blessed Olalekan, Ajayi Adeola,
Affiliations : Department of Computer Engineering Technology, Gateway (ICT) Polytechnic Saapade, Nigeria, 2Institute for Entrepreneurship and Development Studies Obafemi Awolowo University, Nigeria
Abstract :


The study surveyed the use of the Internet and social networking media as digital dividend among undergraduate students in Nigerian Polytechnic. A total of 700 questionnaires were distributed using a frequency count and percentage to select the respondents. A total of 527 questionnaires was retrieved were used for the survey. The findings revealed a high percentage use Internet and social networking media. The access point for them is mobile phones. The institution, though linked to the Internet is yet to provide access to students. Respondents subscribed for the access time through their pocket money. The use of the Internet among the students has affected the use of the school library because they claimed they got everything they needed to get in the library from the internet. Some problems they face in their use of the Internet include slowness of the server, electricity for charging their mobile phones and payment for the access time. The study recommends that the polytechnic should provide good access points for students and make it available in the library too.
DOI Link : NA

Access, Internet, Networking;, Social, Student, Telecommunication.

Oyebola Blessed Olalekan, Ajayi Adeola, “A Study on Online Chatting and Blogging among Teens Age in Southwest Part of Nigeria and Its Impact: A Digital Dividend”, International Journal Of Computer Engineering In Research Trends, 4(1):21-25, January-2017. [InnoSpace-2017:Special Edition]

 [1]  L. A. Ogunsola Hezekiah, (2005) Information and Communication Technologies and the Effects of lobalization: Twenty-First Century "Digital Slavery" for Developing Countries--Myth or Reality? Electronic Journal of Academic and Special Librarianship, v.6 no.1-2 (Summer 2005).
 [2] Social networking service.
[3]  Audu C, Internet availability and use by postgraduate students of University of Nigeria, Nsukka, Global Review of Library & Information Science 2: 3443. 2003
[4] Oketunji, L., Computer application to libraries. Compendium of papers. presented at the 39th National Annual Conference and AGM of Nigerian Library Association held at Concord Hotel, Owerri from 17th 22nd June: 812,. 2001.

There are currently no refbacks

Paper Title : Development of a Sim800l Based Reprogrammable Household Smart Security System with Recipient Phone Call Alert
Authors : Oyebola Blessed Olalekan, ,
Affiliations : Department of Computer Engineering Technology, Gateway (ICT) Polytechnic Saapade, Nigeria
Abstract :


Security has become a major issue everywhere. Home security is becoming necessary nowadays as the possibilities of intrusion are increasing day by day. A traditional home security system gives the signals regarding alarm or text alert through GSM. However, this paper proffers, also, a reprogrammable system that puts forward phone call straightway to the recipient anywhere in the world with GSM network coverage SIM800L (GSM Module) with PIC12F1840 Microcontroller and a motion sensor or detector.
DOI Link : NA

Microcontroller, SMS, Call, Security

Oyebola Blessed Olalekan, “Development of a Sim800l Based Reprogrammable Household Smart Security System with Recipient Phone Call Alert”, International Journal Of Computer Engineering In Research Trends, 4(1):15-20, January-2017. [InnoSpace-2017:Special Edition]

1.	T.K Hareedran (2015) GSM home security system  with Arduino using GSM technology – An theft system
2.	Ahmed, B.I, Yakubu, F.G Bagiwa, M.H and Abdullahi,U.I ( 2011), Remote Home management: An alternative for working cut home while way. World of computer science and information Technology Journal (WCSIT); 14144.147
3.	Jawarkar, N.P, M Ahmed, V Ladhake, S.A and Thakare, R.D (2008). Microcontroller based Remote monitoring using mobile through spoken commands. Journal of networks,3,2,58.63. Retrieved from http:// www. Academic jnm/vol031/n002/jnw03025863.pdf
4.	Gwenael, L.Bodic (2005). Mobile messaging:SMS, EMS AND MMS
5.	Marie and Albert (1996) invention patent for a closed cicuit television security system.
6.	Sabudin, E.N., Zarina, M., Mohd, M.M., Abd Wahab, H., Johari, A. and Ghani, N.B. (2008). GSM based Notification speed Detection for Monitoring purposes. Proceeding of IEEE International Symposium of Information Technology. 

There are currently no refbacks

Paper Title : Distant Mission UAV capability with on-path charging to Increase Endurance, On-board Obstacle Avoidance and Route Re-planning facility
Authors : Pandya Garvit Kalpesh , ,
Affiliations : Department of Aeronautical Engg, Veltech Dr. RR & Dr. SR University, Chennai-600 062, India.
Abstract :


UAVs (Unmanned Aerial Vehicles), especially Quad copters is facing challenges in their mission due to its lower endurance. As such, the missions having long distances are not achievable through Quad copters. The performance of any vehicle, while testing, is one of the most important factors. This performance is based on range, endurance, altitude, attitude control, VTOL (Vertical Take-Off and Landing), battery life, and other autonomous functionalities. The major problem we are facing in the field of UAVs is battery life. The use of higher mAh battery is not a perfect solution as the weight also increases with the size of the battery and that will then require once level higher mAh battery and this may not end soon. Several different techniques can be applied to eliminate or reduce the above drawback. One can be, in the mission path itself, take the drone down to the ground, change its battery and continue the mission, which is a kind of out of logic things. The other solution which we can find is the use of a charging dock. In this case, no need to follow the vehicle, everything can be automatic with the help of a sensor and communication system. The above solution ends the endurance problem but, if the endurance is higher and mission is longer, it necessary to put on necessary sensors for the safety of the vehicle.
DOI Link : NA

UAV, charging facility, endurance, collision avoidance, route re-plan.

Pandya Garvit Kalpesh, “Distant Mission UAV capability with on-path charging to Increase Endurance, On-board Obstacle Avoidance and Route Re-planning facility”, International Journal Of Computer Engineering In Research Trends, 4(1):10-14, January-2017. [InnoSpace-2017:Special Edition]

1.	Skysense Company - Charging Pad Datasheet 201601 
2.	Victor H. L. Cheng: Concept Development of Automatic Guidance for Rotorcraft Obstacle Avoidance. In: IEEE transactions on Robotics and Automation 6(2):252-257, (1990)
3.	George Vachtsevanos, Ben Ludington, Johan Reimann, Panos Antsaklis, Kimon Valavanis: Modeling and Control of Unmanned Aerial Vehicles– Current Status and Future Directions. In: Workshop on Modeling and Control of Complex Systems (MCCS), Ayia Napa, Cyprus, (2005)
4.	Ryan W. Proud, Jeremy J. Hart, Richard B. Mrozinski: Methods for Determining the Level of Autonomy to Design into a Human Spaceflight Vehicle: A Function Specific Approach. In: NASA Johnson Space Center. (2013)
5.	Pulkit Goyal, Ewoud Smeur and Guido de Croon: Mission Planning for Sensor Network Deployment using a Fleet of Drones. In: Delft University of Technology, Delft, Zuid-Holland, 2629 HS, The Netherlands. (2016)
7.	Erick Camacho, Marco Robaina, Alessandro Tasca, Pedre Cuberos, Ibrahim Tansel, Sabri Tosungolu: Collision Avoidance Protocol for package Delivering Quadcopters. In: Florida Conference on Recent Advances in Robotics (2015).
9.	Video – drone wireless charging system (
10.	Video – World's first home w_ drone charging station (   

There are currently no refbacks

Paper Title : A Review on Different Techniques of Solar Food Cooking
Authors : Usha.C.Pawar, S. J. Shankargouda, Dr. Pravin V.Honguntiker, ,
Affiliations : Department of Mechanical Engineering, DattaMeghe College of Engineering, Navi Mumbai, MS, India
Abstract :


Energy consumption for cooking is unavoidable, though there is continuously increasing the fuel price as well as scarcity of exhausting fossil fuels. Because cooking is the prime priority of human life all over the world. Cooking contributes a major part in sharing of total primary energy consumption in India. Hence it needs an alternative energy source for this purpose. Solar cookers are the best substitute for, heating, cooking and pasteurizing applications. In this paper a review has been made to study the existing literature in the field of solar cookers with the latent heat storage system using PCM.
DOI Link : NA

Solar Energy, Thermal Energy Store, Phase Change Material.

Usha.C.Pawar, S. J. Shankargouda, Dr. Pravin V.Honguntiker, “A Review on Different Techniques of Solar Food Cooking”, International Journal Of Computer Engineering In Research Trends, 4(1):5-9, January-2017. [InnoSpace-2017:Special Edition]

1.	Klemens Schwarzera , Maria Eugenia Vieira da Silva, ―Solar cooking system with or without heat storage for families and institutions, Solar energy 75 2003, 35–41
2.	Kassem, Talal K. and Youssef, M. S. Solar 
Cookers And Its Application For Food cooking In Remote Areas: Review
3.	Sharma, C. R. Chen, V. V. S. Murty, and A. Shukla― Solar cooker with Latent heat storage systems: a review, Renewable and Sustainable Reviews,Vol. 9, pp. 1599-1605, 2009. 
4.	Mohammadreza Sedighi1, Mostafa Zakariapour, ―A Review of Direct and Indirect Solar Cookers, Sustainable Energy, 2014, Vol. 2, No. 2, 44-51,2014.
5.	Lof GOG. Recent investigation in the use of solar energy for cooking. Solar Energy 1963;7:125–33
6.	R.M. Muthusivagami, R. Velraj , R. Sethumadhavan,―Solar cookers with And without thermal storage—A reviews , Renewable and Sustainable Energy Reviews 14, 691–701, 2010  
7.	Domanski R, El-Sebaii AA, Jaworski M. Cooking during off-sunshine hours using PCMs as storage media. Energy 1995;20:607–16
8.	Buddhi D, Sahoo LK. Solar cooker with latent heat storage: design and experimental testing. Energy Conversion and Management 1997;38:493–8 
9.	Sharma, S.D., Buddhi, D., Sawhney, R.L., Sharma, A., 2000. Design development and evaluation of a Latent heat unit for evening cooking in a solar cooker. Energy Conversion and Management 41, 1497– 1508.
10.	Sharma SD, Iwata T, Kitano H, Sagara K. Thermal performance of solar cooker based on an evacuated tube solar collector with a PCM storage unit. Solar Energy 2005;78:416–26
11.	Hussein HMS, El-Ghetany HH, Nada SA. Experimental investigation of novel indirect solar cooker with indoor PCM thermal storage and cooking unit. Energy Conversion and Management 2008; 49:2237– 46.
12.	R.M. Muthusivagami, R. Velraj and R. Sethumadhavan.“Solar cookers with and without thermal storage—A Review”, Renewable and Sustainable Energy Reviews, Vol. 14, pp. 691-701, 2009.
13.	Kedare et al. Solar Cooking through ARUN Solar Boiler and Solar Thermal. Ministry of New & Renewable Energy Government of India. ARUN®100 November 2014.
14.	Rane M V, Rane M M, Meena P M, Shankargouda S J, Bhave D P, Rane A M, Akshay P, 2014, Solar Collector with Absorber Integrated Heat Storage, Patent Application Number-2088-MUM-2014, 2014
15.	Rane M V, Rane M M, Meena P M, Shankargouda S J, Bhave D P, Rane A M, Akshay P, 2015, Solar Collector with Absorber Integrated Heat Storage, PCT Application Number-PCT-IN2015-0000269, PCT Filing Date: 29-06-2015, 2015a

There are currently no refbacks

Paper Title : Study of the effects of orientation and deformation of Sn on fusion cross sections using proximity potentials
Authors : Nabendu Kumar Deb , ,
Affiliations : Department of Physics, Gauhati University, Guwahati-781014, India
Abstract :


Background: The deformed targets and its orientation with collision axis of the projectile and the target in the nuclear fusion reaction influence the fusion cross-section. Statistical Analysis: The effects of static quadrupole and hexadecapole deformation of target are studied using various proximity potentials in the literature. Accordingly, the height and the position of the Coulomb interaction barrier for 18O+118Sn (deformed target) system is studied in this paper. Findings: The nucleus-nucleus potential was found to depend strongly on the deformation parameters as well as the orientation of the deformed target. The fusion cross section of the mentioned system was found out by applying parameters of the various proximity potential on the Wong’s formula. Also the result of a multi dimensional barrier penetration model (BPM) was assessed using CCFULL code. The fusion cross sections of approx 00, Prox 00DP, pro 77, Prox 88, modProx 88, Prox 10 over estimates the results obtained using BPM and the rest of the potentials under-estimates the result obtained using BPM technique.
DOI Link : not applicable

fusion cross-section, effects of deformation, effects of orientation, proximity potentials.

Nabendu Kumar Deb, “Study of the effects of orientation and deformation of Sn on fusion cross sections using proximity potentials”, International Journal Of Computer Engineering In Research Trends, 4(1):1-4, January-2017. [InnoSpace-2017:Special Edition]

1)	M. Dasgupta, D. J. Hinde, N. Rowley, A. M. Stefanini, Annu. Rev. Nucl. Part. Sci. 48, 401 (1998).
2)	P. D. Shildling et al., Physics Letter B 670, 99 (2008).
3)	E. Prasad et al., Physics Review C 81, 054608 (2010).
4)	J. O. Fernandez Niello et al., Physics Review C 43, 2303 (1991).
5)	M. J. Rhoades Brown, V. E. Oberacker, Physics Review Letter 50, 1435 (1983)
6)	I. Dutt, R. K. Puri, Physics Review C 81, 064608 (2010)
7)	I. Dutt, R. K. Puri, Physics Review C 81, 044615 (2010)
8)	I. Dutt, R. K. Puri, Physics Review C 81, 064609 (2010)
9)	C. J. Lin, J. C. Xu, H. Q. Zhang, Z. H. Liu, F. Yang, L.X. Lu, Physics Review C 63, 064606 (2001)
10)	P. Moller et al., Atomic Data and Nuclear Data Tables 59, 185 – 381 (1995)
11)	C. Y. Wong, Physics Review Letter 31, 766 (1973)
12)	N. Takigawa, T. Rumin, N. Ihara, Physics Review C 61, 044607 (2000)
13)	K. Hagino, N. Rowley, A. T. Kruppa, Comp. Physics Comm. 123, 143 (1999).

There are currently no refbacks


Quick Links


Science Central

Score: 13.30

Submit your paper to [email protected]